Overview
overview
7Static
static
3431046097a...2N.exe
windows7-x64
7431046097a...2N.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
-
Size
219KB
-
MD5
1dc0d08b42883b5181f03f7789fd0940
-
SHA1
e0d0c5fba1838442e9d516e3ebb592824ff5c1a5
-
SHA256
431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2
-
SHA512
e04a9050860ac974b27d893d596fe16c0421d8ac0c9833b89503c54704a9b33cacac40fbeb44b04b2bfbac0b0070ba54667db577763dcb888fe4bbf194e85e88
-
SSDEEP
6144:MseuA1t5U0Ta3K06bULdec4hhQ7l9qCaEs:KuAr5UU5BbULoc4hh+pi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe -
Loads dropped DLL 2 IoCs
pid Process 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2504 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 2504 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2504 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 31 PID 2684 wrote to memory of 2504 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 31 PID 2684 wrote to memory of 2504 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 31 PID 2684 wrote to memory of 2504 2684 431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exeC:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe /path="C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5d065df740425479d50c90fd4b7bf0e1f
SHA1d590fbc938934bf4bce9b1da2b5d0258a32c5153
SHA2568a2b01932a72df982a4493f35f130127d6a406825cde0b70e4226e30b45d07c0
SHA512169bff3556fac0da26490ab28b255fbadab72e6bc378e3bcc32bb04341bfcd147d06a069e7cc7c4212f911ada3088538e940c0907ca75739e06c72216e6ac7a8
-
Filesize
48B
MD55c0168240b05163c6e18379f85459d25
SHA1563539de939fc674b32c113c76d7d24db656764c
SHA256722baa0a7e61fd991691edb5ebb35067ef883599e39c3a75cf4a4f3fd872ef5c
SHA5125679424d045bb942723dc8cc508339cee4772b6d8ff2f3fa2fcc79bf421449de2ebb1987194d28b86f4a40b011236d8a30134a5106af9ba39c763fb52773ffeb
-
Filesize
253B
MD5289c7270591d46dd34623e2c79052a84
SHA1adbde0e0deabe7713e2b13efa7587c4f7d03dcea
SHA256831b5ddcb0c8661242e7836c554eac792db5ee926935e91d9a51c45bf026bff5
SHA51212227cf1b0b64a0ef58c858077233eb460eeb0d8b9e2bbc8eed6f993bda0db025ed5b657dbee5545d79bac4419681ede6e8736f31c12f77b6943114d10d42ccb
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977